BE HACKER AWARE
Learn new attack techniques that have been uncovered by CrowdStrike’s threat hunting and incident response teams including: initial attack vectors, persistence, lateral movement and data exfiltration techniques. See new techniques for dealing with malware, ransomware, spearphishing, exploits and malware-free intrusions. Leave knowing how to identify and stop advanced threat activity in your environment.
BRING YOUR OWN ATTACK
Using malware, exploits or other hacking tools, try to exfiltrate data from a system protected by CrowdStrike.